Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWZ4cTQtcjZtci05eDY0
CSRF Vuln can expose user's QRcode
Impact
When a user is setting up two-factor authentication using an authenticator app, a QRcode is generated and made available via a GET request to /tf-qrcode. Since GETs do not have any CSRF protection, it is possible a malicious 3rd party could access the QRcode and therefore gain access to two-factor authentication codes. Note that the /tf-qrcode endpoint is ONLY accessible while the user is initially setting up their device. Once setup is complete, there is no vulnerability.
Patches
This is fixed in the upcoming 4.0.0 release.
Workarounds
You can provide your own URL for fetching the QRcode by defining SECURITY_TWO_FACTOR_QRCODE_URL and providing your own implementation (that presumably required a POST with CSRF protection). This would require changing the two-factor setup template as well.
References
None.
For more information
If you have any questions or comments about this advisory:
- Read this pull request: #423
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWZ4cTQtcjZtci05eDY0
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: about 3 years ago
Updated: over 1 year ago
Identifiers: GHSA-fxq4-r6mr-9x64
References:
- https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-fxq4-r6mr-9x64
- https://pypi.org/project/Flask-Security-Too
- https://github.com/advisories/GHSA-fxq4-r6mr-9x64
Blast Radius: 0.0
Affected Packages
pypi:Flask-Security-Too
Dependent packages: 7Dependent repositories: 64
Downloads: 119,342 last month
Affected Version Ranges: >= 3.2.0, < 3.4.5
Fixed in: 3.4.5
All affected versions: 3.2.0, 3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.4.4
All unaffected versions: 3.0.1, 3.0.2, 3.4.5, 4.0.0, 4.0.1, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 4.1.6, 5.0.0, 5.0.1, 5.0.2, 5.1.0, 5.1.1, 5.1.2, 5.2.0, 5.3.0, 5.3.1, 5.3.2, 5.3.3, 5.4.0, 5.4.1, 5.4.2, 5.4.3